• 5 minutes Mike Shellman's musings on "Cartoon of the Week"
  • 11 minutes Permian already crested the productivity bell curve - downward now to Tier 2 geological locations
  • 17 minutes WTI @ 67.50, charts show $62.50 next
  • 19 hours The Discount Airline Model Is Coming for Europe’s Railways
  • 7 hours Pakistan: "Heart" Of Terrorism and Global Threat
  • 1 hour Desperate Call or... Erdogan Says Turkey Will Boycott U.S. Electronics
  • 3 hours Saudi Fund Wants to Take Tesla Private?
  • 3 hours Starvation, horror in Venezuela
  • 12 hours Venezuela set to raise gasoline prices to international levels.
  • 4 hours Renewable Energy Could "Effectively Be Free" by 2030
  • 6 hours Are Trump's steel tariffs working? Seems they are!
  • 2 days Batteries Could Be a Small Dotcom-Style Bubble
  • 2 days Newspaper Editorials Across U.S. Rebuke Trump For Attacks On Press
  • 2 days Don't Expect Too Much: Despite a Soaring Economy, America's Annual Pay Increase Isn't Budging
  • 1 day Scottish Battery ‘Breakthrough’ Could Charge Electric Cars In Seconds
  • 17 hours Corporations Are Buying More Renewables Than Ever
How To Trade The Turkish Crisis

How To Trade The Turkish Crisis

A run on the Turkish…

The $80 Billion Megaproject Splurge In Oil

The $80 Billion Megaproject Splurge In Oil

The growing lineup of megaprojects…

U.S. Urges Energy Companies To Be On Guard Against Russian Cyberattacks

The U.S. Department of Homeland Security (DHS) is urging operators of the country’s critical infrastructure to check their computers carefully against the possibility they’ve been infected with malicious software from a group of hackers who are believed to be Russian.

The group is known to private malware researchers as “Energetic Bear” because it operates during Russian working hours and mostly targets Western energy companies. The U.S. security firm Symaec and F-Secure of Finland report that the group was responsible for an effort to implant the Havex Trojan infect in their victims’ computers.

On July 1, DHS’s Industrial Control Systems Cyber Emergency Response Team, or ISC-CERT, encouraged the companies to ensure that they already hadn’t been infected and offered specific steps on preventing such attacks.

According to a Symantec report on June 30, Havex is what is known as a “remote access Trojan,” or RAT, malware that secretly enters a computer to give hackers control of the machine. Symantec and F-Secure say the malware ordinarily is used only for spying, but can be modified to sabotage a machine.

In fact, Keven Haley, the director of security response at Symantec, told The New York Times that there’s no evidence that Energetic Bear is bent on eventual sabotage, but merely want to get a better understanding of how the victim companies operate. Still, he cautioned, “[T]he potential for sabotage is there.”

Symantec, F-Secure and DHS have not identified the victims of the attacks except to say they’re in the energy and other industrial fields. They said the attacks have hit at least 1,018 companies in 84 countries, though some infections could be accidental. Most of the infections were in Spain, followed by the United States, France, Italy and Germany.

Related Article: You Won't Believe How Off-Target Grid Security Really Is

The attacks consist of flooding victims with e-mails carrying malicious attachments or hyperlinks. But Energetic Bear also targets websites that are likely to be visited by the companies’ employees. In such “watering hole attacks,” as they are known, the hackers infect a website frequented by the employees, such as the online menu of a nearby restaurant, which then infects the employee’s computer.

A frightening aspect of the Energetic Bear attacks is that they do more than tamper with a computer’s software, which can be fixed relatively easily. Symantec says these hackers often go to the machine’s physical core called the BIOS, or “basic input/output system,” which ultimately renders the computer unusable.

The Energetic Bear attacks resemble Operation Olympic Games, a series of reported attacks by the United States and Israel against Iran. The campaign used the Stuxnet virus in July 2010 to sabotage Iran’s uranium enrichment plants in what Symangec calls “the first known major malware campaign to target [industrial control] systems.”

By Andy Tully of Oilprice.com



Join the discussion | Back to homepage

Leave a comment

Leave a comment

Oilprice - The No. 1 Source for Oil & Energy News